IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

HSPD 7

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Homeland Security Presidential Directive 7, Presidential Decision Directive 63, Homeland Security Presidential Directive No. 7, Protecting America's Critical Infrastructures, PDD-63, HSPD-7, PDD 63
DEFINITION: HSPD-7 (Homeland Security Presidential Directive No. 7) is a directive that was issued by U.S. President George W. Bush in December, 2003 to update policies intended to protect the country from terrorist attacks. This directive superseded the earlier PDD-63 (Presidential Decision Directive No. 63), which was issued by President Clinton in May of 1998. The original purpose of PDD-63 (which predated  … 
Definition continues below.
HSPD 7Reports
201 - 225 of 3236 Matches Previous Page  | Next Page
An Innovative Infrastructure to Capture the Value of the Internet of Everything
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource details four major questions business leaders are asking as IT scrambles to keep up with growing demands.
Posted: 03 Apr 2014 | Published: 12 Dec 2013

Cisco Systems, Inc.

An Introduction to HP's Site Visit Program
sponsored by Hewlett-Packard Limited
WEBCAST: Site visit programs play a critical role in any successful outsourcing initiative. This on-demand webcast describes key features of an effective site visit program.
Posted: 11 Mar 2014 | Premiered: Oct 25, 2013

Hewlett-Packard Limited

Analyst's take: Managing IT in an economic downturn
sponsored by ComputerWeekly.com
WHITE PAPER: As companies face the prospect of a recession, IT is even more challenged to justify and deliver value while avoiding risky projects.  This is not the time to slash budgets; instead, follow a few rules to simplify decision making and focus your investment in areas that deliver the greatest return.
Posted: 20 Oct 2011 | Published: 04 Mar 2011

ComputerWeekly.com

Analyst's take: Nucleus Research's top 10 IT predictions for 2010
sponsored by ComputerWeekly.com
WHITE PAPER: The cloud continues to drive both rapid ROI and new ISV business models.  Beyond the cloud, expect 2010 to bring greater use of analytics, automation, and CRM, and a permanent shift in structural unemployment.  Bid auf Wiedersehen to the vendors who still haven’t gotten it.
Posted: 24 Oct 2011 | Published: 26 Jan 2011

ComputerWeekly.com

Analytics across the ecosystem
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Analytics is a key enabler for life sciences and healthcare organizations to create better outcomes for patients, customers and other stakeholders across the entire healthcare ecosystem, according to this research from IBM.
Posted: 14 Feb 2014 | Published: 14 Feb 2014

ComputerWeekly.com

And the Winner Is...The 2013 Impact Awards
sponsored by SearchDataCenter.com
WHITE PAPER: The Modern Infrastructure Impact Awards recognize technology products in the areas of data center infrastructure, cloud computing, enterprise mobility management, hybrid storage and desktop and application delivery.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

SearchDataCenter.com

Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by Dell, Inc.
WHITE PAPER: This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

Dell, Inc.

Antivirus Evasion Techniques Show Ease In Avoiding Antivirus Detection
sponsored by Malwarebytes Corporation
EGUIDE: This expert e-guide uncovers what's next for avoiding some of the most dangerous cyber-attacks.
Posted: 21 Mar 2014 | Published: 21 Mar 2014


Application Hardening: Evolving Techniques for Proactive Enterprise Application Security
sponsored by SearchSecurity.com
EBOOK: This expert guide from SearchSecurity.com provides crucial tips for creating an effective threat and vulnerability management program and examines how you can strengthen and streamline your application security.
Posted: 21 Oct 2013 | Published: 21 Oct 2013

SearchSecurity.com

Application Performance Management for Dummies
sponsored by Riverbed Technology, Inc.
EBOOK: Application performance management helps deliver the application performance users and the business demand. Effectively monitoring and troubleshooting application performance issues requires a comprehensive solution.
Posted: 24 Jul 2013 | Published: 24 Jul 2013

Riverbed Technology, Inc.

Amplifying the Signal in the Noise of IT Monitoring
sponsored by Zenoss, Inc.
WHITE PAPER: This case study details the value of moving past the traditional, fragmented approach to IT monitoring.
Posted: 30 Oct 2013 | Published: 30 Oct 2013

Zenoss, Inc.

An Architectural Framework for Enterprise Email Infrastructure & Security: Getting It Right Today, Getting Ready for Tomorrow
sponsored by Sendmail, Inc.
WHITE PAPER: This white paper examines the architecture limitations prevalent in today's large-enterprise email networks.
Posted: 22 Oct 2008 | Published: 22 Oct 2008

Sendmail, Inc.

An EMC Perspective on Data De-Duplication for Backup
sponsored by EMC Corporation
WHITE PAPER: This paper explores the factors that are driving the need for de-duplication and the benefits of data de-duplication as a feature of an organization's backup strategy.
Posted: 19 Jun 2008 | Published: 01 May 2008

EMC Corporation

An Introduction to Intelligent Desktop Virtualization (IDV)
sponsored by Virtual Computer, Inc.
VIDEOCAST: Explore a desktop virtualization technology, Intelligent Desktop Virtualization (IDV), which can provide all the benefits of VDI with lower costs and complexity. Discover how IDV compares to VDI technology in this videocast.
Posted: 23 Feb 2012 | Premiered: Feb 23, 2012

Virtual Computer, Inc.

Analog to IP Migration Strategy
sponsored by Sony Electronics Asia Pacific Pte Ltd
WHITE PAPER: This resource notes the trend in high-definition (HD) video cameras for enhanced video surveillance, and how the migration from analog to IP can be customized to fit your organization's needs.
Posted: 08 Oct 2013 | Published: 08 Oct 2013

Sony Electronics Asia Pacific Pte Ltd

Anatomy of a Database Attack
sponsored by Imperva
WEBCAST: Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva

Anatomy of an IPv6 Unicast Address
sponsored by Command Information
PRODUCT LITERATURE: IPv6 is the next generation Internet protocol. It was designed to replace the current version, IPv4, and will bring superior reliability, flexibility and security to the Internet.
Posted: 09 Jun 2008 | Published: 01 Jan 2007

Command Information

Anittel Simplifies Managed Antivirus Service Case Study
sponsored by Webroot
CASE STUDY: This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.
Posted: 14 May 2013 | Published: 14 May 2013

Webroot

Antivirus Evaluation Guide
sponsored by Threat Track
WHITE PAPER: In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
Posted: 13 Sep 2013 | Published: 31 Dec 2012

Threat Track

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track

AppConnect and AppTunnel: Advanced Security for Mobile Apps
sponsored by MobileIron
WHITE PAPER: This exclusive resource discusses a security solution that prevents data loss as mobile applications become business-critical and widespread tools in the enterprise.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

MobileIron

Application Compatibility - The Key to Preparing for Windows 7
sponsored by Centrix Software
WHITE PAPER: This resource provides answers to your top Windows 7 migration questions and more. Learn how to successfully prepare for Windows 7 by determining what applications are being used before the application compatibility process even starts.
Posted: 05 Mar 2012 | Published: 22 Feb 2012

Centrix Software

Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security
sponsored by BlueCoat
WHITE PAPER: Your business depends on one thing: getting the right information to the right people at the right time. To gain a competitive advantage, improve customer service and access more business intelligence, you have to ensure fast and responsive application delivery to users wherever they are.
Posted: 14 Sep 2010 | Published: 14 Sep 2010

BlueCoat

Application Rationalization Datasheet
sponsored by Apptio
WHITE PAPER: To achieve decision agility, IT organizations need a scalable way to make business sense out of disconnected financial, operational, and project data about their application portfolio. Read on to learn more about innovative solutions!
Posted: 16 Oct 2013 | Published: 15 Oct 2013

Apptio

Application Release Automation: An Introduction
sponsored by UC4 Software, Inc
VIDEO: Application release can be very complex and challenging due the manual efforts involved. Automating this process can free up IT staff, cut costs, and accelerate release cycles. This brief video introduces application release automation, a new technology that takes care of the whole package, including planning, deploying, monitoring and more.
Posted: 02 Apr 2012 | Premiered: 31 Jan 2012

UC4 Software, Inc
201 - 225 of 3236 Matches Previous Page    7 8 9 10 11 12    Next Page
 
HSPD 7 DEFINITION (continued): …  the September 11, 2001 attacks) was to require federal agencies to ensure the continuity and viability of physical and computer-based systems essential for minimal functioning of the U.S. government and economy in case of a terrorist attack. Under HSPD-7, federal departments and agencies are required to develop methods and technologies to protect all critical infrastructures and key resources of the government and economic sector. The primary intent of HSPD-7 is to prevent the exploitation, incapacitation, or destruction of these infrastructures and resources. However, a secondary goal is to foster … 
HSPD 7 definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement